{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:47:07Z","timestamp":1771476427737,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031422850","type":"print"},{"value":"9783031422867","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42286-7_30","type":"book-chapter","created":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T17:02:36Z","timestamp":1692896556000},"page":"533-543","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Intimate Data: Exploring Perceptions of\u00a0Privacy and\u00a0Privacy-Seeking Behaviors Through the\u00a0Story Completion Method"],"prefix":"10.1007","author":[{"given":"Diana P.","family":"Moniz","sequence":"first","affiliation":[]},{"given":"Maryam","family":"Mehrnezhad","sequence":"additional","affiliation":[]},{"given":"Teresa","family":"Almeida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,25]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/3406091","author":"T Almeida","year":"2020","unstructured":"Almeida, T., Balaam, M., Bardzell, S., Hansen, L.K.: Introduction to the special issue on HCI and the body: reimagining women\u2019s health (2020). https:\/\/doi.org\/10.1145\/3406091","journal-title":"Introduction to the special issue on HCI and the body: reimagining women\u2019s health"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Almeida, T., Comber, R., Wood, G., Saraf, D., Balaam, M.: On looking at the vagina through labella. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 1810\u20131821 (2016). https:\/\/doi.org\/10.1145\/2858036.2858119","DOI":"10.1145\/2858036.2858119"},{"key":"30_CR3","doi-asserted-by":"publisher","unstructured":"Almeida, T., Shipp, L., Mehrnezhad, M., Toreini, E.: Bodies like yours: enquiring data privacy in femtech. In: Adjunct Proceedings of the 2022 Nordic Human-Computer Interaction Conference, pp. 1\u20135 (2022). https:\/\/doi.org\/10.1145\/3547522.3547674","DOI":"10.1145\/3547522.3547674"},{"issue":"1","key":"30_CR4","first-page":"143","volume":"36","author":"S Arora","year":"2014","unstructured":"Arora, S., Yttri, J., Nilsen, W.: Privacy and security in mobile health (mhealth) research. Alcohol Res. Curr. Rev. 36(1), 143 (2014)","journal-title":"Alcohol Res. Curr. Rev."},{"key":"30_CR5","doi-asserted-by":"publisher","unstructured":"Bardzell, J., Bardzell, S., Lazar, A., Su, N.M.: (re-)framing menopause experiences for HCI and design. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2019). https:\/\/doi.org\/10.1145\/3290605.3300345","DOI":"10.1145\/3290605.3300345"},{"key":"30_CR6","unstructured":"Braun, V., Clarke, V.: Thematic analysis. American Psychological Association (2012)"},{"key":"30_CR7","unstructured":"Brown, B.: Studying the internet experience. HP laboratories technical report HPL 49 (2001)"},{"key":"30_CR8","doi-asserted-by":"publisher","unstructured":"Bussone, A., Stumpf, S., Wilson, S.: Designing for reflection on shared HIV health information. In: Proceedings of the 13th Biannual Conference of the Italian SIGCHI Chapter: Designing the next Interaction, CHItaly 2019. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3351995.3352036","DOI":"10.1145\/3351995.3352036"},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/14780887.2018.1536378","volume":"16","author":"V Clarke","year":"2019","unstructured":"Clarke, V., Braun, V., Frith, H., Moller, N.: Editorial introduction to the special issue: using story completion methods in qualitative research. Qual. Res. Psychol. 16(1), 1\u201320 (2019)","journal-title":"Qual. Res. Psychol."},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Dilisha, P., Ann, B., Mark, W., Jill, S., Judith, S.: I feel like only half a man\u201c: Online forums as a resource for finding a\u201d new normal\" for men experiencing fertility issues. 3. Proc. ACMHum.-Comput. Interact 3 (2019)","DOI":"10.1145\/3359184"},{"issue":"8","key":"30_CR11","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1177\/1461444819833331","volume":"21","author":"NA Draper","year":"2019","unstructured":"Draper, N.A., Turow, J.: The corporate cultivation of digital resignation. New Media Soc. 21(8), 1824\u20131839 (2019). https:\/\/doi.org\/10.1177\/1461444819833331","journal-title":"New Media Soc."},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Endler, M., Lavelanet, A., Cleeve, A., Ganatra, B., Gomperts, R., Gemzell-Danielsson, K.: Telemedicine for medical abortion: a systematic review. BJOG: Int. J. Obstetrics Gynaecol. 126(9), 1094\u20131102 (2019)","DOI":"10.1111\/1471-0528.15684"},{"key":"30_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2022.3160928","author":"J Erickson","year":"2022","unstructured":"Erickson, J., Yuzon, J.Y., Bonaci, T.: What you don\u2019t expect when you\u2019re expecting: Privacy analysis of femtech. IEEE Trans. Technol. Soc. (2022). https:\/\/doi.org\/10.1109\/TTS.2022.3160928","journal-title":"IEEE Trans. Technol. Soc."},{"key":"30_CR14","unstructured":"Gibbs, A.S.J., Estcourt, C., Sonnenberg, P., Blandford, A.: Are hiv smartphone apps and online interventions fit for purpose? In: ACM International Conference Proceeding Series Part F128634 (2017)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Gkatzidou, V., et al.: A user-centred approach to inform the design of a mobile application for STI diagnosis and management. In: 27th International BCS Human Computer Interaction Conference (HCI 2013) 27, pp. 1\u20136 (2013)","DOI":"10.14236\/ewic\/HCI2013.36"},{"key":"30_CR16","doi-asserted-by":"publisher","unstructured":"Haimson, O.L., Gorrell, D., Starks, D.L., Weinger, Z.: Designing trans technology: defining challenges and envisioning community-centered solutions. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2020). https:\/\/doi.org\/10.1145\/3313831.3376669","DOI":"10.1145\/3313831.3376669"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"30_CR18","first-page":"679","volume":"51","author":"KE Levy","year":"2014","unstructured":"Levy, K.E.: Intimate surveillance. Idaho L. Rev. 51, 679 (2014)","journal-title":"Intimate surveillance. Idaho L. Rev."},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Liu, B., Lin, J., Sadeh, N.: Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In: Proceedings of the 23rd International Conference on World Wide Web, pp. 201\u2013212 (2014)","DOI":"10.1145\/2566486.2568035"},{"key":"30_CR20","doi-asserted-by":"publisher","unstructured":"Mehrnezhad, M., Almeida, T.: Caring for intimate data in fertility technologies. In: CHI \u201921: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u201311. ACM (2021). https:\/\/doi.org\/10.1145\/3411764.3445132","DOI":"10.1145\/3411764.3445132"},{"key":"30_CR21","doi-asserted-by":"publisher","unstructured":"Mehrnezhad, M., Almeida, T.: \u201cMy sex-related data is more sensitive than my financial data and i want the same level of security and privacy\u201d: user risk perceptions and protective actions in female-oriented technologies (2023). https:\/\/doi.org\/10.48550\/arXiv.2306.05956","DOI":"10.48550\/arXiv.2306.05956"},{"key":"30_CR22","doi-asserted-by":"publisher","unstructured":"Mehrnezhad, M., Shipp, L., Almeida, T., Toreini, E.: Vision: too little too late? do the risks of femtech already outweigh the benefits? In: EuroUSEC \u201922: Proceedings of the 2022 European Symposium on Usable Security, pp. 145\u2013150 (2022). https:\/\/doi.org\/10.1145\/3549015.3554204","DOI":"10.1145\/3549015.3554204"},{"key":"30_CR23","doi-asserted-by":"publisher","unstructured":"Mustafa, M., Zaman, K.T., Ahmad, T., Batool, A., Ghazali, M., Ahmed, N.: Religion and women\u2019s intimate health: towards an inclusive approach to healthcare. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2021). https:\/\/doi.org\/10.1145\/3411764.3445605","DOI":"10.1145\/3411764.3445605"},{"key":"30_CR24","doi-asserted-by":"publisher","first-page":"104247","DOI":"10.1109\/ACCESS.2020.2999934","volume":"8","author":"L Nurgalieva","year":"2020","unstructured":"Nurgalieva, L., O\u2019Callaghan, D., Doherty, G.: Security and privacy of mhealth applications: a scoping review. IEEE Access 8, 104247\u2013104268 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"30_CR25","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1177\/0093650211418338","volume":"40","author":"YJ Park","year":"2013","unstructured":"Park, Y.J.: Digital literacy and privacy behavior online. Commun. Res. 40(2), 215\u2013236 (2013). https:\/\/doi.org\/10.1177\/0093650211418338","journal-title":"Commun. Res."},{"issue":"1","key":"30_CR26","doi-asserted-by":"publisher","first-page":"205395171882054","DOI":"10.1177\/2053951718820549","volume":"6","author":"J Sadowski","year":"2019","unstructured":"Sadowski, J.: When data is capital: datafication, accumulation, and extraction. Big Data Soc. 6(1), 2053951718820549 (2019)","journal-title":"Big Data Soc."},{"issue":"4","key":"30_CR27","doi-asserted-by":"publisher","first-page":"491","DOI":"10.2478\/popets-2020-0083","volume":"2020","author":"L Shipp","year":"2020","unstructured":"Shipp, L., Blasco, J.: How private is your period?: a systematic analysis of menstrual app privacy policies. Proc. Priv. Enhancing Technol. 2020(4), 491\u2013510 (2020)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"Slupska, J., Dawson Duckworth, S.D., Ma, L., Neff, G.: Participatory threat modelling: exploring paths to reconfigure cybersecurity. In: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u20136 (2021)","DOI":"10.1145\/3411763.3451731"},{"key":"30_CR29","unstructured":"Statista: Digital health - worldwide (2023). www.statista.com\/outlook\/dmo\/digital-health\/worldwide. Accessed 20 April 2023"},{"key":"30_CR30","doi-asserted-by":"publisher","unstructured":"Tuli, A., Singh, S., Narula, R., Kumar, N., Singh, P.: Rethinking menstrual trackers towards period-positive ecologies. In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. CHI 2022. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3491102.3517662","DOI":"10.1145\/3491102.3517662"},{"key":"30_CR31","doi-asserted-by":"crossref","unstructured":"Watson, A., Lupton, D.: Tactics, affects and agencies in digital privacy narratives: a story completion study. Online Information Review 45 (2021)","DOI":"10.1108\/OIR-05-2020-0174"},{"key":"30_CR32","doi-asserted-by":"crossref","unstructured":"Wilkinson, D., et al.: User-tailored privacy by design. In: Proceedings of the Usable Security Mini Conference (2017)","DOI":"10.14722\/usec.2017.23007"},{"key":"30_CR33","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ijhcs.2016.09.006","volume":"98","author":"PJ Wisniewski","year":"2017","unstructured":"Wisniewski, P.J., Knijnenburg, B.P., Lipford, H.R.: Making privacy personal: profiling social network users to inform privacy education and nudging. Int. J. Hum Comput Stud. 98, 95\u2013108 (2017)","journal-title":"Int. J. Hum Comput Stud."},{"key":"30_CR34","doi-asserted-by":"publisher","unstructured":"Wisniewski, P.J., Page, X.: Privacy theories and frameworks. In: Modern Socio-Technical Perspectives on Privacy, pp. 15\u201341. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-82786-1_2","DOI":"10.1007\/978-3-030-82786-1_2"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42286-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T18:08:07Z","timestamp":1714068487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42286-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031422850","9783031422867"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42286-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"25 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"406","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,01","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Courses: 6 Industrial Experiences: 2 Interactive demos: 10 Panels: 2 Keynotes: 2 Posters: 44 Workshop summaries: 16- Submissions -As for full paper: 220 As for short papers: 186","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}